
Visit Our Sponsors |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Radio frequency identification (RFID) has been around for over sixty years, so why does it have such negative connotations? Many misconceptions and horror stories of organizations' failed implementations have been plastered all over the press, which has contributed to the negative perceptions of this re-emerging technology. Yet these failures are often due to a lack of the correct technology, deficient information technology (IT) knowledge, budgetary constraints, unqualified business partners, and a general misunderstanding of the overall effectiveness of RFID technology and how it relates to an organization's business.
Navigating through a complicated new system that requires its own hardware, software, and infrastructure is a daunting mission. Given the complexities of evolving standards, converting today's bar codes into tomorrow's electronic product codes (EPCs), and the prospects of how all of this changes the way a company functions, it is understandable why organizations may take a long look before making the leap to RFID.
Before getting started, organizations should understand the components of an RFID system, the mechanics of the technology, and tag types and their characteristics to decide if RFID is a worthwhile investment for their businesses. An RFID system generally consists of tags, encoders, readers, and a host computer. These represent the minimum requirements for a functional RFID system to operate. Each component of the system will be defined, and an explanation of each one's use will be explored below.
Within RFID, everything starts with the tag. The tag has a computer chip that is programmed with information that uniquely identifies each item. Information is exchanged when the tag is activated.
Tags and readers each contain antennae because of the radio interaction they require. The antenna attaches to the integrated circuit (IC) to absorb and emit signals. RFID is a means of uniquely identifying an object through a radio link. A reader, also called an interrogator or "master," communicates with a tag, called a transponder or "slave." Each item has a unique identification code. Data between the tags and the readers are exchanged via radio waves, and no direct line of sight is required for this transaction to occur. The reader requests data from the tag or processes the signal being emitted by the tag, decodes the transmission, and transfers the data back to the computer system. The type of tag determines how the tag will respond to the reader. The computer may do various tasks to process the data, such as record the reading, look up the tag ID in a database to direct further action, or direct the interrogator to write additional information to the tag.
Within RFID, everything starts with the tag. The tag has a computer chip that is programmed with information that uniquely identifies each item. The electrical field emitted by the reader energizes the tag to trigger a read of information from the tag. The arrows indicate the flow of data among the readers, the antennae, and the server. In this example, the boxes pass through the portal (antennae), and the data captured from the tags are transmitted to the reader and then to the host computer for processing. Information is exchanged when the tag is activated, either by the energy emitted from the portal or, in the case of an active tag, by a battery within the tag that emits energy for the antenna to read.
The tags are key components of any RFID system. Understanding the properties, capabilities, and limitations of each tag type will assist in the solution design. The five different types of tags, their advantages, disadvantages, and common applications for each are as follows:
Active Tags usually contain their own power sources, are heavier, and have a large data storage capacity (upward of 1 megabyte). Given these attributes, active tags generally cost more than other tags and typically support more complicated read applications. Uses for active tags differ by applications. Active tags will alert the interrogator that further action is needed. This function enables the company to track the location of an item, as well as which stage of the process that item has reached and what the required action to execute should be. The advantages of an active tag are its longer read ranges, greater memory capacity, and that it emits a continuous signal. Disadvantages include the need to replace batteries within the tag (depending on frequency of use), the need for a battery size generally larger than that of other tag types, the cost of the physical tag, and the cost to maintain the battery within the tag.
An example of where an active tag may be implemented is in the tracking of high-value assets within an organization. Another example of an active tag application is its giving of operational instructions when it arrives at a particular station within the manufacturing process. The tag has the ability to trigger a subsequent operation, like the activation of a robotic arm, for example, and the information is updated and appended to each step within the process.
Passive Tags are generally less expensive than active tags because they have no internal power source. They also have limited data storage capacity (typically 32 to 128 bits), are read only, and have a limited read range (up to 3 meters). The tags themselves hold very little data, but they can serve to identify an object from a database containing large amounts of information.
The main advantage of a passive tag is its reasonable cost-approximately 20 to 30 cents per tag. Key disadvantages include limited read range, no tracking update feature, and the inability to rewrite to the tag. Typical uses include pallet and case level identification, as found in the retail mandates of Wal-Mart and the US Department of Defense (DoD), for example. A tag can be attached to a product that can be tracked at each stage of production. The conveyor system can then identify the item and receive routing information to be sent to the correct loading dock without human intervention.
Semi-Passive Tags have many of the characteristics of a passive tag (small, lightweight, limited memory), but it also has a battery backup to extend the answer range. Common uses include shop floor containers, pallets, kitting, and just-in-time applications.
The advantages of semi-passive tags include having a longer read range and battery life, while the disadvantages include additional expense and maintenance of the battery.
Generation 2 Tags: Within the RFID market, a lack of standards has resulted in manufacturers having different operating guidelines for tags, readers, and antennae. EPCglobal, an RFID unifying body, has established standards for vendors to adhere to in the design of infrastructure, but this has caused hardware and software to be incompatible between companies, and has made collaboration with suppliers nearly impossible. Universal, standard design, and adherence to this standard, has resulted in increased adoption within the industry. Consequently, read rates have increased dramatically. EPCglobal's standard operating specifications consist of tag, antenna, and reader standards. Adherence to this standard is easing RFID implementations. The interoperability of multi protocol readers and consistency of tag manufacturing processes have provided more consistent read rates and allowed different types of tags to be used with different readers that aid collaboration efforts.
A distinct advantage of RFID is its automation of processes. Generation 2 (Gen 2) tags, with their stable operations in read rates and information exchange, allow ease of operation. With extra stability, great gains in processing speed can be made using automated sorting and material handling by limiting or, in some cases, eliminating human intervention. Gen 2 allows the dozens of individual objects within a group to be uniquely identified at the same time because backscatter is controlled, which was sometimes a problem in the past. Backscatter control results in very stable reads by allowing multiple objects to be differentiated within the electrical scanning field.
Does RFID fit the organization or not? Before venturing down the RFID path, organizations should determine the suitability of RFID for their operations. In determining fit, organizations should evaluate existing applications and future requirements to anticipate potential stresses in their warehousing and distribution areas. Constraints that hinder business efficiency can cause the organization to consider RFID as a solution to some of its problems. If any of the circumstances below, which represent key issues when assessing the suitability of RFID, describe the business conditions that an organization faces, RFID may be the solution that fits to quell these concerns:
Some of the common warehouse operations listed above are where bottlenecks occur or where restraints can be seen; an RFID system can alleviate and remove these obstacles. If the response to two or more of these circumstances is "yes," then an RFID implementation should be considered. Although organizations in the same industry have very different business processes, RFID can aid in the argument to maximize efficiency.
Although prices have dropped recently due to an increase in tag production, the costs of RFID implementations are still a prohibitive issue. The case for RFID should be considered from a total cost of ownership (TCO) perspective while accounting for organizational growth, the competitive advantages of inventory visibility, better customer service due to the efficiency increased product tracking, and the ability to limit "out of stock" conditions. Other avenues for inventory visibility that can compete with RFID are also emerging, such as wireless fidelity (WIFI) and global positioning system (GPS). An organization should consider the cost of hardware, middleware (edgeware), printers, as well as the cost of the tags themselves, in relation to the benefits and the cost of the items that are being tracked.
http://www.technologyevaluation.com/Research/ResearchHighlights/SCM/2007/06/research_notes/TU_SC_DP_06_15_07_1.asp?id=51.2007.06.15.4042&e
RELATED CONTENT
RELATED VIDEOS
Timely, incisive articles delivered directly to your inbox.